emalderson / ThePhishLinks
ThePhish: an automated phishing email analysis tool
☆1,231Updated 10 months ago
Alternatives and similar repositories for ThePhish
Users that are interested in ThePhish are comparing it to the libraries listed below
Sorting:
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆926Updated this week
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆795Updated 10 months ago
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆581Updated 8 months ago
- A query aggregator for OSINT based threat hunting☆897Updated this week
- A resource containing all the tools each ransomware gangs uses☆1,041Updated this week
- Incident Response Methodologies 2022☆1,052Updated last month
- SIEM Tactics, Techiques, and Procedures☆629Updated last week
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,402Updated 8 months ago
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆909Updated last week
- Purple Team Exercise Framework☆706Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆664Updated last month
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆683Updated 2 weeks ago
- Bloodhound Reporting for Blue and Purple Teams☆1,198Updated 3 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆906Updated last year
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆561Updated this week
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆731Updated 2 months ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,292Updated this week
- Send phishing messages and attachments to Microsoft Teams users☆1,080Updated 11 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆575Updated last month
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,480Updated 2 weeks ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,181Updated 2 weeks ago
- ☆516Updated 7 months ago
- A collection of resources for Threat Hunters☆886Updated 7 months ago
- Detect Tactics, Techniques & Combat Threats☆2,164Updated last week
- A knowledge base of actionable Incident Response techniques☆637Updated 3 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆392Updated 2 weeks ago
- Collaborative Incident Response platform☆1,196Updated last week
- Awesome Security lists for SOC/CERT/CTI☆984Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,207Updated 4 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,338Updated 6 months ago